Cyber security news for all

More

    Sold Tesla Parts Found Still Containing User Data

    The information storage system in Tesla, apart from having the capacity to display YouTube videos, having access to Netflix, and directly being able to play off Spotify, connecting via WiFi, can also store recently contacted phone numbers.

    These advantages, though, do diminish the fact that the systems need a lot of personal data. Therefore, a user tends not to notice the vast amount of information fed to these devices. This information can reveal extremely personal and sometimes even intimate facts about the owners. This could affect them terribly if it ever falls into the wrong hands.

    A researcher was able to gain access to several used Tesla MCUs (media control units), over 10 of them all removed from electric vehicles during melioration. Each one of these devices had a plethora of sensitive information stored away despite already superannuating.

    Contact from all previously connected phones and calendar entries are there. They also include recent WiFi and Spotify passwords, inputted addresses, and session cookies that grant access to Spotify, youtube, and even more disturbingly E-mail accounts.

    Tesla has a regular procedure of taking out MCUs at their service station, most times to replace it with newer and more advanced models of the device. Authorized Tesla technicians do the removal.

    However, the company leaked these used Tesla MCUs. Presumably, the company did not know about the sales.

    With the research results, the company and its users are at risk. Also, the drivers suffer the risks of any vehicle that has devices onboard which store personal information.

    It is, therefore, recommendable for individuals on their own to perform factory resets when selling a car. Also when returning a rented vehicle, or having an infotainment system looked upon by strangers.

    Conclusion

    While a factory reset may not be undefeatable, it’s likely to make the recovery process difficult and time-consuming enough to provide a meaningful and practical defense. It is advisable that the truly security conscious should destroy the units.

    Recent Articles

    TikTok has fixed a serious security gap issue

    TikTok accounts paid a researcher a reward of 4000 dollars after he reported two vulnerabilities as part of a disclosure. A combination of both...

    Passwords should be changed for Fortinet VPNs

    Administrators should change the access for Fortinet VPNs in use. Log-in information for almost 50,000 VPN networks has appeared in various cyber blogs. A security...

    Twitter confirmed to bring back account verification

    Twitter is bringing back verifications for the account verification in the beginning of 2021. Certain users will then be given a control mark again,...

    350,000 Spotify users were hacked

    At the beginning of July this year, security researchers discovered an unsecured database that contained access and other information from 350,000 Spotify users. Spotify...

    Europol sees artificial intelligence as a dangerous cyber threat

    Cyber criminals can use intelligence to carry out attacks more easily and thus cause more damage. Europol is warning of this in a joint...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox